Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop.

Hunk drives improvements in the speed and simplicity of interacting with and analysing data in Hadoop without programming, integrations or data migrations.

Key features include:

Splunk Virtual Index: Splunk virtual index technology enables the seamless use of the entire Splunk technology stack, including the Splunk Search Processing Language (SPL), for interactive exploration, analysis and visualisation of data stored anywhere, as if it was stored in a Splunk software index. Hunk uses this foundational technology and is the first product to come from this innovation.

Explore Data in Hadoop from One Place: Hunk is designed for interactive data exploration across large, diverse data sets. There is no requirement to “understand” data upfront, simply point Hunk at the Hadoop cluster and start exploring data immediately.

Interactive Analysis of Data in Hadoop: Hunk enables users to drive deep analysis, detect patterns and find anomalies across terabytes and petabytes of data. Users can correlate data to spot trends, identify patterns of interest and enrich insights even further by connecting data from external relational databases using Splunk DB Connect.

Report on and Visualize Data in Hadoop: Users can build advanced graphs and charts on-the-fly to make their data more meaningful. Share these with other users on laptops, tablets or other mobile devices.

Create Custom Dashboards: Hunk users can combine multiple charts, views and reports into role-specific dashboards which can be viewed and edited on laptops, tablets or other mobile devices. Hunk also allows users to ensure secure access with role-based access controls.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.